Suchergebnis: Katalogdaten im Frühjahrssemester 2021
Cyber Security Master | ||||||
Vertiefungsgebiet | ||||||
Seminar | ||||||
Nummer | Titel | Typ | ECTS | Umfang | Dozierende | |
---|---|---|---|---|---|---|
252-2603-00L | Seminar on Systems Security Number of participants limited to 22. The deadline for deregistering expires at the end of the second week of the semester. Students who are still registered after that date, but do not attend the seminar, will officially fail the seminar. | W | 2 KP | 2S | S. Shinde | |
Kurzbeschreibung | The seminar will focus on fundamental and recent topics in systems security. | |||||
Lernziel | The learning objective is to analyze selected research papers published at top systems+security venues and then identify open problems in this space. The seminar will achieve this via several components: reading papers, technical presentations, writing analysis and critique summaries, class discussions, and exploring potential research topics. | |||||
Inhalt | Each student will pick one paper from the selected list, present it in the class, and lead the discussion for that paper. All students will read at most two research papers per week and submit their critique summaries before each class. | |||||
Voraussetzungen / Besonderes | Students who are either interested in security research or are exploring thesis topics are highly encouraged to take this course. Students with systems/architecture/verification/PL expertise and basic security understanding are welcome. | |||||
263-4651-00L | Current Topics in Cryptography Number of participants limited to 24. The deadline for deregistering expires at the end of the second week of the semester. Students who are still registered after that date, but do not attend the seminar, will officially fail the seminar. | W | 2 KP | 2S | D. Hofheinz, U. Maurer, K. Paterson | |
Kurzbeschreibung | In this seminar course, students present and discuss a variety of recent research papers in Cryptography. | |||||
Lernziel | Independent study of scientific literature and assessment of its contributions as well as learning and practicing presentation techniques. | |||||
Inhalt | The course lecturers will provide a list of papers from which students will select. | |||||
Literatur | The reading list will be published on the course website. | |||||
Voraussetzungen / Besonderes | Ideally, students will have taken the D-INFK Bachelors course “Information Security" or an equivalent course at Bachelors level. Ideally, they will have attended or will attend in parallel the Masters course in "Applied Cryptography”. |
- Seite 1 von 1